Savan Patel

@Savan_77

Cyber Security Enthusiastic || Information Security Analyst || Infosec Professional ...!

Vrijeme pridruživanja: prosinac 2017.

Tweetovi

Blokirali ste korisnika/cu @Savan_77

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @Savan_77

  1. proslijedio/la je Tweet
    prije 13 sati

    v1.32 has been released with great additions by : - payload minimization - raw cmd command - auto command encoding within JSON/XML messages 1.35 will followup shortly with / SessionSecurityToken gadget & other minor improvements

    Poništi
  2. proslijedio/la je Tweet
    prije 12 sati

    I know $12 USD is a lot of money for some people, so as a tiny way to help I'm giving away 500 copies of my SQL zine. (honour system: only use the free link if you can't afford $12 ❤️) free link: regular price link:

    Prikaži ovu nit
    Poništi
  3. proslijedio/la je Tweet
    Poništi
  4. proslijedio/la je Tweet
    prije 20 sati

    DOM clobbering strikes back, yet another so valuable article by

    Poništi
  5. proslijedio/la je Tweet
    prije 20 sati

    Great introduction to DOM Clobbering. What is missing though, is the trick with the <iframe> to dive down way more levels than 3 ;) I included the idea of iframes in the solution to my XSS challenge:

    Poništi
  6. proslijedio/la je Tweet
    prije 19 sati

    what's a container?

    Prikaži ovu nit
    Poništi
  7. proslijedio/la je Tweet

    Tried to reverse a wireless router only to be thwarted by encrypted firmware? shows methods for overcoming this roadblock in his latest blog.

    Poništi
  8. proslijedio/la je Tweet
    prije 21 sat

    Full writeup via on how hides commands in Office metadata Then master Malware Analysis with at . Get your Early Bird ticket 🔥 Register Now

    Poništi
  9. proslijedio/la je Tweet
    6. velj

    Let's get hands dirty with at today 2:00 PM by . Awaiting for the brainstorming hands-on session.

    Poništi
  10. proslijedio/la je Tweet
    5. velj

    Our very own , , , and are teaching at from Feb 10-13. If you're attending , stop by and say hello 👋 Then train with us at in August! Get your Early Bird ticket 👏

    Poništi
  11. proslijedio/la je Tweet
    5. velj

    Tempus Fugit: 1 Vulnhub Rooted writeup Publish Soon

    Poništi
  12. proslijedio/la je Tweet
    5. velj
    Prikaži ovu nit
    Poništi
  13. proslijedio/la je Tweet
    4. velj
    Poništi
  14. proslijedio/la je Tweet
    5. velj

    FWIW, I will be working on updating the unc0ver jailbreak for iOS 13.0-13.3 as soon as the new kernel exploit is available. For now, make sure that automatic software updates are disabled on your device and save blobs for iOS 13.3.

    Prikaži ovu nit
    Poništi
  15. proslijedio/la je Tweet
    3. velj

    When testing for SSRF, change the HTTP version from 1.1 to HTTP/0.9 and remove the host header completely. This has worked to bypass several SSRF fixes in the past.

    Poništi
  16. proslijedio/la je Tweet
    4. velj
    Prikaži ovu nit
    Poništi
  17. proslijedio/la je Tweet
    4. velj

    Interested in... exploitation? exploitation? analysis? security? ? exploitation? ? ? exploitation? ? exploitation? ? Attend 2020 👉

    Poništi
  18. proslijedio/la je Tweet
    4. velj

    GitHub Security Lab disclosed a bug submitted by grzegol: - Bounty: $3,000

    Poništi
  19. proslijedio/la je Tweet
    4. velj
    Poništi
  20. proslijedio/la je Tweet
    3. velj
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·